Policy DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policy Data returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Endpoint Security
 •   Security Monitoring
 •   Wireless Security
 •   Application Security

Related Searches
 •   Diagram Policy Data
 •   Implement Policy Data
 •   India Policy Data
 •   Parts Policy
 •   Policy Data Louisiana
 •   Policy Data Part
 •   Policy Data Support
 •   Policy Manufacturers
 •   Policy Providers
 •   Schedules Policy
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Veritas NetBackup™ 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies by Symantec Corporation

February 2008 - (Free Research)
This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage is used cost-effectively while still maintaining appropriate levels of recoverability. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Say “Yes” to Mobile Devices by McAfee, Inc.

November 2011 - (Free Research)
Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints. 
(WHITE PAPER) READ ABSTRACT |

IDC Vendor Profile: CommVault Gains Market Share and Continues to Outperform Storage Software Markets by CommVault Systems, Inc.

February 2010 - (Free Research)
Over the past five years, the storage software industry has faced consolidation. Large incumbents have acquired innovative technology from start-ups and emerging companies. CommVault Systems (CVLT) is a data and information management software provider challenging traditional incumbents. 
(ANALYST REPORT)

CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing by Dell, Inc. and Microsoft

August 2011 - (Free Research)
Access this paper to learn about five trends that are shaping the future of enterprise mobility, and get nine recommendations for the new era of enterprise mobility. Finally, learn how Dell is uniquely prepared to help customers embrace and manage consumerization and the challenges and risks that come with consumerization-related changes. 
(WHITE PAPER) READ ABSTRACT |

Are You Securely Delivering Enterprise Data and Services? by Webroot

November 2011 - (Free Research)
Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.

December 2008 - (Free Research)
Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall. 
(ARTICLE) READ ABSTRACT |

The Malware Report: Hotel Business Center PCs Strike Again by ESET

August 2009 - (Free Research)
Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely. 
(PODCAST) READ ABSTRACT |

Introduction to Evolved Packet Core by Alcatel-Lucent

June 2009 - (Free Research)
This white paper provides a brief introduction to Evolved Packet Core - a new mobile core for LTE. Key concepts and functional elements are outlined, as well as key changes in LTE requirements imposed on the Evolved Packet Core, and the deployment challenges one can expect to encounter. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for a Successful DLP Deployment by TITUS

November 2011 - (Free Research)
This is your guide to a successful DLP deployment including 5 best practices to ensure that your DLP solution is setup for success from the start. 
(WHITE PAPER) READ ABSTRACT |

Nine Steps to Smart Security for Small Businesses by Qualys

October 2011 - (Free Research)
This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs. 
(WHITE PAPER) READ ABSTRACT |

Pharmaceutical Services Company Accelerates Virtual Desktops by Cisco Systems, Inc.

July 2012 - (Free Research)
This case study demonstrates how Quintiles Pharmaceutical Services extended WAN optimization to 100 percent of their virtual desktop infrastructure and improved traffic flow with their existing bandwidth, allowing for secure and centralized data and access control, and high levels of employee satisfaction. 
(CASE STUDY) READ ABSTRACT |

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats by BlueCoat

July 2011 - (Free Research)
This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them. 
(EGUIDE) READ ABSTRACT |

The Promise of Content-Aware Identity and Access Management by CA Technologies.

October 2010 - (Free Research)
This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy. 
(PODCAST) READ ABSTRACT |

Securing the Virtual World by WatchGuard Technologies, Inc.

September 2012 - (Free Research)
With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach. 
(WHITE PAPER) READ ABSTRACT |

BYOD Security Policy Considerations and Best Practices by Symantec Corporation

November 2012 - (Free Research)
This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control. 
(EGUIDE) READ ABSTRACT |

The Compliance Case for Social Media Records Management by Iron Mountain

September 2012 - (Free Research)
In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits. 
(EGUIDE) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Data Management Strategies for the CIO by Quantum Corporation

August 2011 - (Free Research)
CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on data management topics such as storage and retention policies, data protection and lifecycle management. 
(EBOOK)

Information Governance for Business Value by IBM

August 2013 - (Free Research)
In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy. 
(EGUIDE) READ ABSTRACT |

BYOD: Device Freedom Without Compromising the IT Network by Cisco (E-mail this company)

May 2013 - (Free Research)
Uncover the drivers, benefits, and challenges of Bring Your Own Device (BYOD) and learn how – with the right solution – you can keep your employees happy and organisation safe at the same time. 
(WHITE PAPER) READ ABSTRACT |

Mapping Security For Your Virtual Environment by Hewlett-Packard Company

May 2012 - (Free Research)
In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems. 
(WHITE PAPER) READ ABSTRACT |

Clearswift Government Communications 2.0 by Clearswift

August 2013 - (Free Research)
In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust. 
(WHITE PAPER) READ ABSTRACT |

A sample travel and expense policy template for large companies by Concur Technologies (E-mail this company)

December 2013 - (Free Research)
This resource outlines 12 considerations for creating an effective travel and expense policy, and offers recommendations to help you move forward. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts